/* $OpenLDAP$ */
/*
- * Copyright 1998-2000 The OpenLDAP Foundation, All Rights Reserved.
+ * Copyright 1998-2002 The OpenLDAP Foundation, All Rights Reserved.
* COPYING RESTRICTIONS APPLY, see COPYRIGHT file
*/
/* backend.c - routines for dealing with back-end databases */
#ifdef NEW_LOGGING
LDAP_LOG(( "backend", LDAP_LEVEL_DETAIL1,
"backend_startup: starting \"%s\"\n",
- be->be_suffix[0] ));
+ be->be_suffix[0]->bv_val ));
#else
Debug( LDAP_DEBUG_TRACE,
"backend_startup: starting \"%s\"\n",
- be->be_suffix[0], 0, 0 );
+ be->be_suffix[0]->bv_val, 0, 0 );
#endif
if ( be->bd_info->bi_open ) {
int backend_destroy(void)
{
int i;
+ BackendDB *bd;
/* destroy each backend database */
- for( i = 0; i < nBackendDB; i++ ) {
- if ( backendDB[i].bd_info->bi_db_destroy ) {
- backendDB[i].bd_info->bi_db_destroy(
- &backendDB[i] );
+ for( i = 0, bd = backendDB; i < nBackendDB; i++, bd++ ) {
+ if ( bd->bd_info->bi_db_destroy ) {
+ bd->bd_info->bi_db_destroy( bd );
}
+ ber_bvecfree( bd->be_suffix );
+ ber_bvecfree( bd->be_nsuffix );
+ if ( bd->be_rootdn.bv_val ) free( bd->be_rootdn.bv_val );
+ if ( bd->be_rootndn.bv_val ) free( bd->be_rootndn.bv_val );
+ if ( bd->be_rootpw.bv_val ) free( bd->be_rootpw.bv_val );
+ acl_destroy( bd->be_acl, global_acl );
}
+ free( backendDB );
/* destroy each backend type */
for( i = 0; i < nBackendInfo; i++ ) {
Backend *
select_backend(
- const char * dn,
+ struct berval * dn,
int manageDSAit,
int noSubs )
{
- int i, j, len, dnlen;
+ int i, j;
+ ber_len_t len, dnlen = dn->bv_len;
Backend *be = NULL;
- dnlen = strlen( dn );
for ( i = 0; i < nbackends; i++ ) {
for ( j = 0; backends[i].be_nsuffix != NULL &&
backends[i].be_nsuffix[j] != NULL; j++ )
{
- if ((backends[i].be_glueflags&SLAP_GLUE_SUBORDINATE)&&
- noSubs)
+ if (( backends[i].be_flags & SLAP_BFLAG_GLUE_SUBORDINATE )
+ && noSubs )
+ {
continue;
+ }
len = backends[i].be_nsuffix[j]->bv_len;
/* suffix is longer than DN */
continue;
}
-
- if ( len && len < dnlen && ( !DN_SEPARATOR( dn[(dnlen-len)-1] ) || DN_ESCAPE( dn[(dnlen-len)-2] ) ) ) {
+ if ( len && len < dnlen &&
+ ( !DN_SEPARATOR( dn->bv_val[(dnlen-len)-1] ) ||
+ DN_ESCAPE( dn->bv_val[(dnlen-len)-2] ) ) )
+ {
/* make sure we have a separator */
continue;
}
-
- if ( strcmp( backends[i].be_nsuffix[j]->bv_val, &dn[dnlen-len] ) == 0 ) {
+ if ( strcmp( backends[i].be_nsuffix[j]->bv_val,
+ &dn->bv_val[dnlen-len] ) == 0 )
+ {
if( be == NULL ) {
be = &backends[i];
}
int
-be_isroot( Backend *be, const char *ndn )
+be_isroot( Backend *be, struct berval *ndn )
{
- int rc;
-
- if ( ndn == NULL || *ndn == '\0' ) {
+ if ( !ndn->bv_len ) {
return( 0 );
}
- if ( be->be_root_ndn == NULL || *be->be_root_ndn == '\0' ) {
+ if ( !be->be_rootndn.bv_len ) {
return( 0 );
}
- rc = strcmp( be->be_root_ndn, ndn ) ? 0 : 1;
-
- return(rc);
+ return dn_match( &be->be_rootndn, ndn );
}
int
-be_isupdate( Backend *be, const char *ndn )
+be_isupdate( Backend *be, struct berval *ndn )
{
- int rc;
-
- if ( ndn == NULL || *ndn == '\0' ) {
+ if ( !ndn->bv_len ) {
return( 0 );
}
- if ( be->be_update_ndn == NULL || *be->be_update_ndn == '\0' ) {
+ if ( !be->be_update_ndn.bv_len ) {
return( 0 );
}
- rc = strcmp( be->be_update_ndn, ndn ) ? 0 : 1;
-
- return(rc);
+ return dn_match( &be->be_update_ndn, ndn );
}
-char *
+struct berval *
be_root_dn( Backend *be )
{
- if ( be->be_root_dn == NULL ) {
- return( "" );
- }
-
- return be->be_root_dn;
+ return &be->be_rootdn;
}
int
be_isroot_pw( Backend *be,
Connection *conn,
- const char *ndn,
+ struct berval *ndn,
struct berval *cred )
{
int result;
return 0;
}
- if( be->be_root_pw.bv_len == 0 ) {
+ if( be->be_rootpw.bv_len == 0 ) {
return 0;
}
#endif
#endif
- result = lutil_passwd( &be->be_root_pw, cred, NULL );
+ result = lutil_passwd( &be->be_rootpw, cred, NULL );
#if defined( SLAPD_CRYPT ) || defined( SLAPD_SPASSWD )
#ifdef SLAPD_SPASSWD
return LDAP_CONFIDENTIALITY_REQUIRED;
}
- if( op->o_ndn == NULL ) {
+ if( op->o_ndn.bv_len == 0 ) {
*text = "modifications require authentication";
return LDAP_OPERATIONS_ERROR;
}
if( requires & SLAP_REQUIRE_STRONG ) {
/* should check mechanism */
- if( op->o_authmech == NULL ||
- op->o_dn == NULL || *op->o_dn == '\0' )
+ if( op->o_authmech == NULL || op->o_dn.bv_len == 0 )
{
*text = "strong authentication required";
return LDAP_STRONG_AUTH_REQUIRED;
}
if( requires & SLAP_REQUIRE_SASL ) {
- if( op->o_authmech == NULL ||
- op->o_dn == NULL || *op->o_dn == '\0' )
+ if( op->o_authmech == NULL || op->o_dn.bv_len == 0 )
{
*text = "SASL authentication required";
return LDAP_STRONG_AUTH_REQUIRED;
}
if( requires & SLAP_REQUIRE_AUTHC ) {
- if( op->o_dn == NULL || *op->o_dn == '\0' ) {
+ if( op->o_dn.bv_len == 0 ) {
*text = "authentication required";
return LDAP_UNWILLING_TO_PERFORM;
}
Backend *be,
Connection *conn,
Operation *op,
- const char *dn,
- const char *ndn )
+ struct berval *dn,
+ struct berval *ndn )
{
int rc = LDAP_SUCCESS;
Connection *conn,
Operation *op,
Entry *target,
- const char *gr_ndn,
- const char *op_ndn,
+ struct berval *gr_ndn,
+ struct berval *op_ndn,
ObjectClass *group_oc,
AttributeDescription *group_at
)
{
GroupAssertion *g;
- int len = strlen(gr_ndn);
int i;
ldap_pvt_thread_mutex_lock( &op->o_abandonmutex );
i = op->o_abandon;
ldap_pvt_thread_mutex_unlock( &op->o_abandonmutex );
- if (i)
- return SLAPD_ABANDON;
+ if (i) return SLAPD_ABANDON;
- if( strcmp( target->e_ndn, gr_ndn ) != 0 ) {
+ if ( !dn_match( &target->e_nname, gr_ndn ) ) {
/* we won't attempt to send it to a different backend */
- be = select_backend(gr_ndn, 0,
- (be->be_glueflags & SLAP_GLUE_INSTANCE));
+ be = select_backend( gr_ndn, 0,
+ (be->be_flags & SLAP_BFLAG_GLUE_INSTANCE));
if (be == NULL) {
return LDAP_NO_SUCH_OBJECT;
ldap_pvt_thread_mutex_lock( &conn->c_mutex );
for (g = conn->c_groups; g; g=g->next) {
if (g->be != be || g->oc != group_oc || g->at != group_at ||
- g->len != len)
+ g->len != gr_ndn->bv_len)
continue;
- if (strcmp( g->ndn, gr_ndn ) == 0)
+ if (strcmp( g->ndn, gr_ndn->bv_val ) == 0)
break;
}
ldap_pvt_thread_mutex_unlock( &conn->c_mutex );
group_oc, group_at );
if (op->o_tag != LDAP_REQ_BIND) {
- g = ch_malloc(sizeof(GroupAssertion) + len);
+ g = ch_malloc(sizeof(GroupAssertion) + gr_ndn->bv_len);
g->be = be;
g->oc = group_oc;
g->at = group_at;
g->res = res;
- g->len = len;
- strcpy(g->ndn, gr_ndn);
+ g->len = gr_ndn->bv_len;
+ strcpy(g->ndn, gr_ndn->bv_val);
ldap_pvt_thread_mutex_lock( &conn->c_mutex );
g->next = conn->c_groups;
conn->c_groups = g;
Connection *conn,
Operation *op,
Entry *target,
- const char *e_ndn,
+ struct berval *edn,
AttributeDescription *entry_at,
- struct berval ***vals
+ BerVarray *vals
)
{
- if( target == NULL || strcmp( target->e_ndn, e_ndn ) != 0 ) {
+ if ( target == NULL || !dn_match( &target->e_nname, edn ) ) {
/* we won't attempt to send it to a different backend */
- be = select_backend(e_ndn, 0,
- (be->be_glueflags & SLAP_GLUE_INSTANCE));
+ be = select_backend( edn, 0,
+ (be->be_flags & SLAP_BFLAG_GLUE_INSTANCE));
if (be == NULL) {
return LDAP_NO_SUCH_OBJECT;
}
if( be->be_attribute ) {
- return be->be_attribute( be, conn, op, target, e_ndn,
+ return be->be_attribute( be, conn, op, target, edn,
entry_at, vals );
}
Backend *be,
Connection *conn,
Operation *op,
- Entry *e )
+ Entry *e,
+ AttributeName *attrs,
+ int opattrs )
{
- Attribute *a = NULL;
+ Attribute *a = NULL, **ap = &a;
#ifdef SLAPD_SCHEMA_DN
- a = ch_malloc( sizeof( Attribute ) );
- a->a_desc = slap_schema.si_ad_subschemaSubentry;
-
- /* Should be backend specific */
- a->a_vals = ch_malloc( 2 * sizeof( struct berval * ) );
- a->a_vals[0] = ber_bvstrdup( SLAPD_SCHEMA_DN );
- a->a_vals[1] = NULL;
-
- a->a_next = NULL;
+ *ap = slap_operational_subschemaSubentry();
+ ap = &(*ap)->a_next;
#endif
+ /*
+ * If operational attributes (allegedly) are required,
+ * and the backend supports specific operational attributes,
+ * add them to the attribute list
+ */
+ if ( ( opattrs || attrs ) && be && be->be_operational != NULL ) {
+ ( void )be->be_operational( be, conn, op, e, attrs, opattrs, ap );
+ }
+
return a;
}
+